Sat.May 06, 2017 - Fri.May 12, 2017

article thumbnail

9 best practices to improve security in industrial IoT

Tech Republic Security

Dell EMC's senior product manager for IoT security, Rohan Kotian, hosted a presentation at Dell EMC World explaining how industrial enterprises can protect their IoT deployments.

IoT 167
article thumbnail

[0day] Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer

Scary Beasts Security

Overview In my previous post, we explored using an ImageMagick 0day (now a 1day) in the RLE decoder to to determine missing ASLR in both box.com and dropbox.com. In response, both Box and DropBox sensibly limited the available decoders. Both dropped RLE support and lots more. As you may recall from a different but related post , I had challenges working with Box to accurately determine the status of security reports I submitted.

51
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New ABA Opinion – Attorneys Must Take Reasonable Cybersecurity Measures To Protect Client Data

Privacy and Cybersecurity Law

On May 11, 2017, the American Bar Association (ABA) issued Formal Opinion 477, making clear that a lawyer may transmit information […].

article thumbnail

4 questions businesses should be asking about cybersecurity attacks

Tech Republic Security

At the 2017 Dell EMC World conference, RSA senior director of advanced cyber defense, Peter Tran, walked through examples of real-world IT questions and how they could be answered.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms

Tech Republic Security

It's a shocking discovery that could shake your concept of security to its core: Those trusted to protect your networks are ignoring their own policies. Is something rotten in the state of cybersec?

article thumbnail

Why SMBs are at high risk for ransomware attacks, and how they can protect themselves

Tech Republic Security

Ransomware cost businesses more than $1B last year, and SMBs are particularly susceptible to attack. Here are some tips and best practices for keeping your company safe.

More Trending

article thumbnail

Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits

Tech Republic Security

Two members of Google's Project Zero discovered a serious exploit over the weekend. It's so bad it can take over a system just by sending an email-no opening or reading necessary.

120
120
article thumbnail

Industrial robots are more vulnerable to cyberattacks than you think

Tech Republic Security

A new report from Trend Micro indicates that industrial robots are targets for hackers and cybercriminals. Find out the researchers' proposed solution to a more secure robotic ecosystem.

115
115
article thumbnail

Major ransomware attack hits hospitals in England, shutting down IT systems

Tech Republic Security

Hospitals and doctor's surgeries across England are having to cancel non-emergency operations after a major ransomware attack on the National Health Service.

article thumbnail

HP users beware: Laptops revealed to have built-in keylogger

Tech Republic Security

Several models of the HP EliteBook, ProBook, and other machines may be recording every keystroke you make. Here's how to fix the problem.

123
123
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cracking Hitler's unbreakable code: How the Colossus computer helped beat the Nazis

Tech Republic Security

Hear recollections from Bletchley Park veterans on how efforts to crack the Lorenz cipher led to the creation of one of the world's first computers.

117
117
article thumbnail

How online marketplace Silk Road became the Craigslist for illegal drugs

Tech Republic Security

In less than two years, a Dark Web marketplace created by a twenty-something libertarian from Texas had generated more than $1.2 billion by selling drugs, weapons and cyanide online.

105
105
article thumbnail

6 tips to protect your G Suite account from phishing scams

Tech Republic Security

After last week's phishing attack, Google detailed how it protects users, and what business customers can do to avoid similar scams.

Scams 111
article thumbnail

Beyond the fingerprint: IBM bolsters enterprise app security with behavioral biometrics

Tech Republic Security

IBM and SecuredTouch are bringing new behavioral biometric authentication based on factors such as typing patterns to enterprise applications.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The best security? Have Zero Trust, says expert

Tech Republic Security

If you want real security, you have to learn not to trust anyone, says ex-PagerDuty expert.

122
122
article thumbnail

Android Security Bulletin May 2017: What you need to know

Tech Republic Security

The May 2017 Android Security Bulletin shatters its previous record of critical vulnerabilities. Get the highlights.

110
110
article thumbnail

How to register an ASA SFR module with the FirePOWER Management Center

Tech Republic Security

To operate a FirePOWER Module in a Cisco ASA there are specific steps that must be followed to allow communication with the FireSIGHT management center. This article details that process.

81
article thumbnail

Video: This smart firewall can protect your home office and business from hidden cyberattacks

Tech Republic Security

Today 6.4 billion devices connect to the Internet, and another 50 billion are expected to come online soon. CUJO CEO Leon Kuperman explains how to say safe in a world loaded with IoT threats.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Video: How the founder of the Silk Road made millions on his illegal startup on the Dark Web

Tech Republic Security

TechRepublic caught up with Nick Bilton, author of American Kingpin, the story of how Ross Ulbricht created an online marketplace for drugs and weapons, generating more than $1.2 billion on the Dark Web.

65
article thumbnail

Video: The Colossus computer and codebreakers who cracked Hitler's secret messages

Tech Republic Security

The lesser known, but no less important veterans of Bletchley Park's World War II efforts

63
article thumbnail

NIST Releases Draft Guidance On Securing Wireless Infusion Pumps In The Healthcare Industry

Privacy and Cybersecurity Law

On May 8, 2017, the National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), […].

article thumbnail

HHS Plans To Launch Cybersecurity Center Focused On Medical App Security

Privacy and Cybersecurity Law

The US Department of Health and Human Services (HHS) announced on April 20 that it plans to launch a cybersecurity initiative modeled […].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

DHS Warns Congress On Mobile Device Security

Privacy and Cybersecurity Law

On May 4, 2017, the US Department of Homeland Security (DHS) submitted a new study to Congress that detailed current and emerging […].

Mobile 40
article thumbnail

Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty :D

Scary Beasts Security

Overview Cloud file storage providers such as Box and DropBox will typically thumbnail uploaded images for purposes of showing icons and previews. Predictably, both providers appear to use ImageMagick for thumbnailing. So what happens if we come knocking with the ImageMagick 1-day CESA-2017-0002? CESA-2017-0002 is a vulnerability in the RLE image decoder, where the allocated render canvas memory is not initialized under some conditions.

62
article thumbnail

Trump administration to move all federal IT into the cloud: Is it realistic?

Tech Republic Security

US president Donald Trump recently signed an executive order on cybersecurity that mandated federal systems move to the cloud. But, questions remain on the feasibility of that goal.

article thumbnail

Trump's cybersecurity executive order: 4 things you need to know

Tech Republic Security

On Thursday, US President Donald Trump signed an executive order to enhance cybersecurity across the nation's infrastructure. Here are the top takeaways.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Video: Trump's cybersecurity order wants to move all federal IT to the cloud

Tech Republic Security

Experts aren't sure it's completely feasible, or the ideal move, however.

article thumbnail

White House Signs New Cybersecurity Executive Order

Privacy and Cybersecurity Law

On May 11, 2017, President Donald Trump signed a new Executive Order on cybersecurity entitled Strengthening the Cybersecurity of Federal Networks and […].